CJTF-7 Interrogation and Counter Resistance Policy

This document is a memorandum establishing interrogation and counter-resistance policy for the Combined Joint Task Force Seven in Baghdad, Iraq. It encourages the segregation of detainees "to ensure the success of interrogations and to prevent sharing of interrogation methods among detainees" and states that "the interrogator should be the one who controls all aspects of the interrogation, to include the lighting, heating and configuration of the interrogation room, as well as the food, clothing, and shelter given to the security internee." The document includes a list of approved interrogation techniques.

Non-legal Memo
Sunday, October 12, 2003
Monday, December 6, 2010

APO AE 09335
OCT 2 Yr:

CY11-. /-CG
C2,Combined Joint Task Force Seven, Baghdad, Iraq 09335
C3,Combined Joint Taik Force Seven, Baghdad, Iraq 09335
Commander, 205th Military Intelligence Brigade, Baghdad, Iraq 09335
SUBJECT: CJTF-7 Interrogation and Counter-Resistance Policy
1.--tScl€6)-This memorandum establishes the interrogation and 'counter-resistanc-ePoliCy for
security internees under the control of CJTF-7. Security internees are civilians who are
detained pursuant to Articles 5 and 78 of the Geneva Convention Relative to the Protection of
Civilian Persons in Time of War of August •2, 1949' (hereinafter, Geneva Convention).
• •. •
'2. (3II TE) I approve the use of specified interrogation and counter-resistance apprOaChes A•
Q, as describedin Enclosure 1, relating to security internees, subject to the following:
• • • • • •
a. "(5771494.1se of-these.appi -oache.s is limited to interrogations of security internees :
under the controlr3f -C1TF-7. •-• . • .
b. (& /NP) These approaches must be used in combination with the safegUards
described in Enclosure 2.• •
c: rStii4F}SegregatiOn of security internees will be required in many instances to
ensure the success of interrogations and to prevent the sharing of interrogation methods .
among internees. Segregation may also be necessary to protect sources.froth. other 4dtainees
or otherwise provide.for their security. Additionally, the Geneva Convention provides that
security internees under definite suspicion of activity hostile to the security of Coalition. •
forces shall, where absolute military necessity requires, be regarded as having forfeited rights
of communication. Accordingly; these sectuity'internees may be segregated. I .must approve
segregation in all cases where such segregation will exceed 30 days in duration, whether
consecutive or nonconsecutive. Submit written requests,with supporting rationale to the .
through the CJTF-.7 C2. A legal review. from the CJTF-7 SJA must accompany each,request. '
d. 4414141n employing•each of • the authorized approaches, the interrogator must
maintain control of the interrogatiOn: The interrogator should appear to be the one who
controls 'all aspects of the interrogation, to include the lighting, heating and configuration of
the interrogation room, as well as the food, clothing and shelter given to the security internee.
• • •• • •
' . 0IG—REQ 02/18/05—PART 9 DOJOIG011964 FBI000077,3
SUBJECT: • CJ'TF.47 Interrogation and Counter-Resistance Policy
3.—tehic Requests for use of approaches not listed in Enclosure 1 will be submitted to me
through CJTF-7 C2, and will include a description of the proposed approach and ,
recommended 'safegua:rds. A legal review from the CITF-7 SJA will accompany each
request. ' ,
. . 4. 7771T14 . ,Nothing in this policy limits existing authority for Maintenance of good order and
discipline among persons under Coalition control.' .

5. signed on 14 September 2003, . . •
6. (Shislr) POC is MA3I I DNVTI I I DSN

'1. Interrogation Approaches (SI) Lieutenant General, USA
'2. General Safeguards , • Commanding
CE•-Comniander,.US Central Command

" OIG—REQ 02/16/057PART 9
.D0JoIG01.1965 FBI000077.4 •
b3 •
(8-/iN F) , . Use of the following approaches is subject•o the application of the general safeguards
provided in enclosure (2), Specific implementation guidance with respect to approaches A-Q is
provided in U.S. Army Field Manual 34-52..Brigade Commanders may provide additional . '
implementation guidance. • -
'A. (S//NI') Direct: Asking Straightforward questions. The most effective of all . approaches; it is.
the most simple and efficient approach to utilize.
E. 1-SW149-Incentive/Removal of Incentive: Providing a reward or removing a privilege, above
and beyond those required by the Geneva Convention., Possible incentives may include favorite.
food items, changes in environmental quality, or other traditional or regional comforts not
required by the Geneva Convention. •
C. 77n1"). Emotional Love: Playing on the love a security internee has for an individual or group..
May involve an incentive, such as allowing communication with the individual or group,
D.Itt/NT) Emotional Hate: Playing on the genuine hatred:or desire for revenge a security .
•internee has for an individual or group. .
E. (S//NF) Fear Up Harsh: Significantly increasing the fear level in a security internee. F. (S//NF)
Fear ,Up Mild:,Moderately increasing the feaT level in a_security internee. • . •
• .
G•1'87'711419 Reduced FeaT: Reducing the fear•level in a security internee or calming him by
- ,
convincing him that he will be properly and humanely treated:
H. (S//NT) Pride and. Ego Up: Flattering or boosting the ego .of a Security internee.'
L{644T4 Pride and Ego Down: Attacking or . insulting the pride or ego of a security internee.
3. ttfftiF}Futility: Invoking the feeling in a security internee that it is useless to resist by'playing
on the doubts that already exist in his mind.
K.t.S754419 We Know All: Convincing the Security internee that the interrogator already;knows
the answersto questions being asked.
L. (&414F4 Establish Your Identity: Convincing the'security internee that the interrogator has.
mistaken the security internee for someone else. The securityinternee is encouraged to "clear his •
M. 77711")- Repetition: Continuously repeating the same question .to the security internee during
an interrogation to encourage full and candid answers to questions.
q\i.'(S//Nr) File and Dossier: Convincing security internee that the interrogator has a voluminous,
thinning and inaccurate file, which must be corrected by the security internee.
OIG—REQ 02/18/05—PARIF9 DOJOIG011966 FB100007:75 •
0. -(8717WF) Mutt and Jeff: An interrogation team consisting of a friendly and a.harsh interrogator.
This approach is ;designed to cause the security internee to have.a feeling of hostility toward one
interrogator and a feeling of gratitude toward the other. •
P. {-8,4+FF-) Rapid Fire: Questioning .in rapid•succession without allowing security internee to
answer questions fully.
Q.4414F) Silence: Staring at the security internee to encourage discomfort..

6 t.U.K.t, 1 /.1.N utclq//X-1
Enclosure 1
OIG—REQ 02/18/05—PART 9 DOJOIG011967
4/-44.4 Application of these interrogation approaches is subject to the -following general
(i) lirnitedto use by trained interrogation pergonnel; (ii) there is a reasonable basis to believe that
the security internee possesses information of intelligence value; (iii) the security internee is
medically evaluated as a suitable candidate for interrogation (considering all approacheS to be
used in combination); (iv) interrogators are specifically trained for the approaches; (v) a specific
interrogation plan, including reasonable safeguards, limits on duration, intervals between
applications, termination criteria and the presence or availability of qualified medical personnel
has been developed; and (vi) there is appropriate supervision.
(U) The purpose of all interviews and interrogations is to get the most information from a security
internee with the least intrusive method, applied in a •umane and lawful manner with sufficient •
'oversight by trained investigators or interrogators. Interrogators and supervisory persOnnel will '
ensure unifor' m, careful, and safe conduct of interrogations.
(S//NF) Interrogations must always be planned, deliberate actions that take into account factors
such as a security internee's current and past performance in both detention and interrogation; a
security internee's emotional and physical strengths and weaknesses; assessment of approaches
and individual techniques that may be effective; strengths and weaknesses of interrogators; and
factors which may necessitate the augmentation of personnel.
) Interrogation approaches are designed to manipulate security 'internee's emotions and,: -
weaknesses to gain his willing cooperation. Interrogation operations are never conducted in .a.
Vacuum; they are conducted in. close cooperation with the detaining units. Detention regulations
and policies established by detaining units should be harmonized to ensure consistency with the'
interrogation policies of the intelligence collection unit. Such consistency will help to maximize
the credibility of the interrogation team and the effectiveness of the interrogation. Strict .
adherence to such regulations, policies and standard, operating- procedures is essential,
1 -87i4,129 Interrogators must appear to completely control the interrogation environment. It is .
important that interrogators be provided reasonable latitude to vary approaches depending on the'
security internee's cultural background, strengths, weaknesses, environment,' extent of resistance ,
training, as well as the urgency with which information believed in the possession of the security
internee must be obtained.
tgrntr) Interrogators must ensure the safety of security. internees, and approaches must in no way
endanger them. Interrogators will ensure .that security internees are allowed adequate sleep; and
that diets provide adequate food and water and cause no adverse medical or cultural effects.
Where segregation is necessary, security internees must be monitored for adverse medical or
psychological reactions. Should military working dogS be present-during interrogations, they will
be muzzled and under control of a handler at all times to ensure safety.
1'554 95 While approaches are considered individually within this analysis, it must be understood
that in practice, approaches are usually used in combination. The title of a particular approach is
not always fully descriptive of a particular approach. The cumulative effect of all approaches to
OIG-REQ 02/18/05-PART 9
be employed must be considered before any decision. is made regardirig approval of a particular
interrogation plan.
Enclosure 2

FB 1023776CBT
OIG—REQ 02/18/05—PART 9
.DOJOIG011969 FBI0000778